]]>Fri, 31 Jul 2015 10:48:42 GMThttp://www.i-programmer.info/bookreviews/5-c/8840-programming-in-c-4e.htmlGroovy in Action 2nd Ed (Manning)http://www.i-programmer.info/book-watch-archive/8837-groovy-in-action-2nd-ed-manning.html
Written by core members of the Groovy language team, this book presents Groovy from the inside out. It provides relevant examples, careful explanations of Groovy's key concepts and features, and insightful coverage of how to use Groovy in-production tasks, including building new applications, integration with existing code, and DSL development. This thoroughly revised second edition has been updated for Groovy 2.4.

]]>Thu, 30 Jul 2015 17:53:45 GMThttp://www.i-programmer.info/book-watch-archive/8837-groovy-in-action-2nd-ed-manning.htmlDevops: A Software Architect's Perspective (Addison Wesley)http://www.i-programmer.info/book-watch-archive/8824-devops-a-software-architects-perspective-addison-wesley.html
DevOps promises to accelerate the release of new software features and improve monitoring of systems in production, but its crucial implications for software architects and architecture are often ignored. Here three leading architects address these issues head-on and review the decisions software architects must make in order to achieve DevOps’ goals. They also provide the organizational, technical, and operational context needed to deploy DevOps more efficiently, and review DevOps’ impact on each development phase.

Microsoft's collection of business intelligence (BI) software is extensive and well integrated, but it's not that easy for the casual observer to work out what's available, which bit to use and how to use it. Does this book help?

]]>Tue, 28 Jul 2015 00:00:00 GMThttp://www.i-programmer.info/bookreviews/124-applications/8827-applied-microsoft-business-intelligence.htmlHadoop Security (O'Reilly)http://www.i-programmer.info/book-watch-archive/8825-hadoop-security-oreilly.html
As more corporations turn to Hadoop to store and process their most valuable data, the risk of a potential breach of those systems increases exponentially. Authors Ben Spivey and Joey Echeverria provide in-depth information about the security features available in Hadoop, and organize them according to common computer security concepts. With real-world examples thet demonstrate how to protect Hadoop data from unauthorized access and also show how to limit the ability of an attacker to corrupt or modify data in the event of a security breach.

]]>Fri, 24 Jul 2015 10:57:59 GMThttp://www.i-programmer.info/bookreviews/19-hardware-platforms/8818-making-simple-robots.htmlIntroduction to Game Development Using Processing (Mercury)http://www.i-programmer.info/book-watch-archive/8728-introduction-to-game-development-using-processing.html
Processing is a free, graphics-oriented language that provides the basic functionality needed for building games. It runs on all major platforms and allows games to be built for desktop computers, HTML 5, and Android. J. R. Parker guides you through the basic game development process, covering game development topics including graphics, sound, artificial intelligence, animation, game engines, Web-based games, etc. The companion DVD contains example code, games, and color figures.

]]>Thu, 23 Jul 2015 00:00:00 GMThttp://www.i-programmer.info/book-watch-archive/8728-introduction-to-game-development-using-processing.htmlCloud Computing Design Patterns (Prentice Hall)http://www.i-programmer.info/book-watch-archive/8810-cloud-computing-design-patterns-prentice-hall.html
Part of the ServiceTechnolgy Series from Thomas Erl this book presents a catalog of design patterns for modern cloud-based architecture and solution design. More than two years in development, its 100+ patterns illustrate proven solutions to common cloud challenges and requirements and are supported by rich, visual documentation, including 300+ diagrams.